CVE Vulnerabilities

CVE-2019-11038

Use of Uninitialized Variable

Published: Jun 19, 2019 | Modified: Nov 21, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
3.3 LOW
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.

Weakness

The code uses a variable that has not been initialized, leading to unpredictable or unintended results.

Affected Software

NameVendorStart VersionEnd Version
LibgdLibgd2.2.5 (including)2.2.5 (including)
PhpPhp7.1.0 (including)7.1.30 (excluding)
PhpPhp7.2.0 (including)7.2.19 (excluding)
PhpPhp7.3.0 (including)7.3.6 (excluding)
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-php71-php-0:7.1.30-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-php72-php-0:7.2.24-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-php71-php-0:7.1.30-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUSRedHatrh-php71-php-0:7.1.30-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUSRedHatrh-php72-php-0:7.2.24-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatrh-php71-php-0:7.1.30-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatrh-php72-php-0:7.2.24-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-php72-php-0:7.2.24-1.el7*
Libgd2Ubuntubionic*
Libgd2Ubuntucosmic*
Libgd2Ubuntudisco*
Libgd2Ubuntuesm-infra-legacy/trusty*
Libgd2Ubuntuesm-infra/bionic*
Libgd2Ubuntuesm-infra/xenial*
Libgd2Ubuntuprecise/esm*
Libgd2Ubuntutrusty/esm*
Libgd2Ubuntuupstream*
Libgd2Ubuntuxenial*

Potential Mitigations

References